Results 251 to 260 of about 26,490 (295)
Some of the next articles are maybe not open access.
Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy
2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2020With the development of location-based applications, more and more trajectory data are collected and applied. Trajectory data often contains user's sensitive information, and direct release may pose a threat to users' privacy. Differential privacy, as a privacy preserving method with solid mathematical foundation, has been widely used in trajectory ...
Ruxue Wen +4 more
openaire +1 more source
In-Network Trajectory Privacy Preservation
ACM Computing Surveys, 2015Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy concerns hinder the adoptability of such applications. In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based ...
Mingming Guo +5 more
openaire +1 more source
Privacy of Spatial Trajectories
2011The ubiquity of mobile devices with global positioning functionality (e.g., GPS and Assisted GPS) and Internet connectivity (e.g., 3G and Wi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring.
Chi-Yin Chow, Mohemad F. Mokbel
openaire +1 more source
Privacy-Preserving Spatial Trajectory Prediction
2014 National Wireless Research Collaboration Symposium, 2014One of the location-based services, spatial trajectory prediction, can be used in a variety of purposes such as travel recommendations and traffic control and planning, but at the same time, just like most location-based services, the concern of user privacy is a major issue.
Wen Chen Hu +3 more
openaire +1 more source
SST: Privacy Preserving for Semantic Trajectories
2015 16th IEEE International Conference on Mobile Data Management, 2015To preserve privacy in trajectory data, most existing approaches adapt cloaking techniques to protect individual location points or clustering and perturbation techniques to protect entire trajectories. To confirm to the k-anonymity model, they first group locations/trajectories and then modify location points to ensure a cluster of k location points ...
Pin-I Han, Hsiao-Ping Tsai
openaire +1 more source
Publishing trajectories with differential privacy guarantees
Proceedings of the 25th International Conference on Scientific and Statistical Database Management, 2013The pervasiveness of location-acquisition technologies has made it possible to collect the movement data of individuals or vehicles. However, it has to be carefully managed to ensure that there is no privacy breach. In this paper, we investigate the problem of publishing trajectory data under the differential privacy model.
Kaifeng Jiang +4 more
openaire +1 more source
Privacy-Preserving Trajectory Collection
2008In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy.
Gidofalvi, Gyozo +2 more
openaire +1 more source
2010
In this era of significant advances in telecommunications and GPS sensors technology, a person can be tracked down to proximity of less than 5 meters. This remarkable progress enabled the offering of services that depend on user location (the so-called location-based services—LBSs), as well as the existence of applications that analyze movement data ...
openaire +1 more source
In this era of significant advances in telecommunications and GPS sensors technology, a person can be tracked down to proximity of less than 5 meters. This remarkable progress enabled the offering of services that depend on user location (the so-called location-based services—LBSs), as well as the existence of applications that analyze movement data ...
openaire +1 more source
Revealing Privacy Vulnerabilities of Anonymous Trajectories
IEEE Transactions on Vehicular Technology, 2018The proliferation of various mobile devices equipped with GPS positioning modules makes the collection of trajectories more easier than ever before, and more and more trajectory datasets have been available for business applications or academic researches.
Shan Chang +4 more
openaire +1 more source
Trajectory Privacy Protection on Spatial Streaming Data with Differential Privacy
2018 IEEE Global Communications Conference (GLOBECOM), 2018Continuously sharing user's trajectory data which contain one's location information makes the crowd sensing of the traffic dynamics and mobility trends feasible. This kind of spatial streaming data is beneficial for intelligent transportation but at the risk of disclosing personal privacy, even if it is published in statistical form such as “the ...
Xiang Liu +3 more
openaire +1 more source

